18/07/2010
Balwark launches latest information security access product
Dubai, UAE
“Organizations with dynamic IP environments lack the ability to trace end users, especially the guest users, which poses a huge risk of information theft.Guest users are usually authenticated using a common pre-shared key. This greatly increases the risk of network abuse by guest users over an extended period of time when they are outside the corporate network. But by using Cyberoam we can Time-bound Wi-Fi access controls for all users, including guests, reduce cost of managing WLAN by replacing separate routers and firewall and Cyberoam’s Layer 8 technology gives complete trace of guest user activity” says Mr. Avinash Chanchalani, Product Manager, Bulwark Technologies LLC
For secure authentication, CR15wi supports multiple virtual access points that create independent, segregated networks in the same physical area of the organization (sales, marketing, guest users etc.). This prevents rogue clients from connecting to networks where they don’t belong.
The usage of MIMO technology improves throughput and range values, thus, enabling faster handling of video streaming and high bandwidth downloads. Cyberoam’s Layer 8 Technology and Application Layer 7 Management over WLAN also allows user-specific bandwidth allocation for non-critical, semi-critical and critical business applications.